City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.114.42.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.114.42.133. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 18:15:35 CST 2025
;; MSG SIZE rcvd: 107
133.42.114.104.in-addr.arpa domain name pointer a104-114-42-133.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
133.42.114.104.in-addr.arpa name = a104-114-42-133.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 37.228.116.52 | attackbotsspam | Apr 4 05:02:59 webhost01 sshd[21243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.116.52 Apr 4 05:03:00 webhost01 sshd[21243]: Failed password for invalid user honghaiyan from 37.228.116.52 port 40814 ssh2 ... |
2020-04-04 06:58:34 |
| 80.211.78.82 | attackbots | Apr 3 23:37:41 ourumov-web sshd\[11270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.82 user=root Apr 3 23:37:43 ourumov-web sshd\[11270\]: Failed password for root from 80.211.78.82 port 33968 ssh2 Apr 3 23:48:24 ourumov-web sshd\[12149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.82 user=root ... |
2020-04-04 06:50:46 |
| 106.13.81.181 | attackbotsspam | Apr 3 19:49:19 firewall sshd[948]: Failed password for root from 106.13.81.181 port 35166 ssh2 Apr 3 19:53:43 firewall sshd[1194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.181 user=root Apr 3 19:53:44 firewall sshd[1194]: Failed password for root from 106.13.81.181 port 41108 ssh2 ... |
2020-04-04 06:54:21 |
| 41.210.17.224 | attack | (imapd) Failed IMAP login from 41.210.17.224 (GH/Ghana/-): 1 in the last 3600 secs |
2020-04-04 06:42:40 |
| 62.210.205.155 | attack | Invalid user test from 62.210.205.155 port 39868 |
2020-04-04 07:10:01 |
| 125.115.211.154 | attackspambots | Automatic report - Port Scan Attack |
2020-04-04 07:08:08 |
| 178.62.23.60 | attackbotsspam | Apr 3 23:40:41 srv206 sshd[29595]: Invalid user fanshikui from 178.62.23.60 Apr 3 23:40:41 srv206 sshd[29595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=kitsong.co.za Apr 3 23:40:41 srv206 sshd[29595]: Invalid user fanshikui from 178.62.23.60 Apr 3 23:40:43 srv206 sshd[29595]: Failed password for invalid user fanshikui from 178.62.23.60 port 32862 ssh2 ... |
2020-04-04 07:02:57 |
| 161.117.39.78 | attack | Apr 3 23:19:25 svapp01 sshd[8373]: User r.r from 161.117.39.78 not allowed because not listed in AllowUsers Apr 3 23:19:25 svapp01 sshd[8373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.39.78 user=r.r Apr 3 23:19:27 svapp01 sshd[8373]: Failed password for invalid user r.r from 161.117.39.78 port 53612 ssh2 Apr 3 23:19:27 svapp01 sshd[8373]: Received disconnect from 161.117.39.78: 11: Bye Bye [preauth] Apr 3 23:22:05 svapp01 sshd[9258]: User r.r from 161.117.39.78 not allowed because not listed in AllowUsers Apr 3 23:22:05 svapp01 sshd[9258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.39.78 user=r.r ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=161.117.39.78 |
2020-04-04 07:11:22 |
| 51.15.51.2 | attack | Apr 3 21:40:53 *** sshd[15369]: User root from 51.15.51.2 not allowed because not listed in AllowUsers |
2020-04-04 06:54:39 |
| 138.197.95.2 | attack | 138.197.95.2 - - [03/Apr/2020:23:41:08 +0200] "GET /wp-login.php HTTP/1.1" 200 6136 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.197.95.2 - - [03/Apr/2020:23:41:11 +0200] "POST /wp-login.php HTTP/1.1" 200 7014 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.197.95.2 - - [03/Apr/2020:23:41:13 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-04-04 06:37:38 |
| 209.97.134.82 | attackbotsspam | Invalid user izl from 209.97.134.82 port 36346 |
2020-04-04 07:05:44 |
| 123.200.10.42 | attackbotsspam | Apr 3 23:40:36 srv206 sshd[29584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.200.10.42 user=root Apr 3 23:40:38 srv206 sshd[29584]: Failed password for root from 123.200.10.42 port 50480 ssh2 ... |
2020-04-04 07:09:47 |
| 104.248.1.92 | attackbotsspam | SASL PLAIN auth failed: ruser=... |
2020-04-04 07:08:34 |
| 129.204.38.136 | attackbotsspam | 5x Failed Password |
2020-04-04 06:35:57 |
| 41.202.168.166 | attackbots | 2020-04-03 23:35:52 plain_virtual_exim authenticator failed for ([127.0.0.1]) [41.202.168.166]: 535 Incorrect authentication data ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=41.202.168.166 |
2020-04-04 06:40:55 |